cisa guidance

  1. Why Johnny Can't Authenticate: Practical OT Security Guidance by CISA

    CISA’s new guidance, "Barriers to Secure OT Communication: Why Johnny Can’t Authenticate," bluntly reframes a long-standing truth for industrial operators: the cryptographic and authentication features necessary to stop simple, high-impact attacks exist in many pockets, yet they are rarely...
  2. Mitigating End-of-Support Edge Devices Under CISA BOD 26-02

    The United States’ cybersecurity apparatus has raised the alarm: edge devices that have reached end-of-support (EOS) are being actively hunted and exploited by nation‑state actors, and organizations must act now to reduce their exposure. This is not theoretical guidance — a joint fact sheet from...
  3. CISA KEV Update: Patch Four Exploited CVEs Now Under BOD 22-01

    CISA’s latest KEV update elevates four distinct and high-impact vulnerabilities—two in Sangoma FreePBX, one in GitLab, and one in SolarWinds Web Help Desk—into the Known Exploited Vulnerabilities (KEV) Catalog, signaling credible evidence of active exploitation and forcing an operational...
  4. CISA Adds CVE-2026-20805 to KEV: Urgent Windows Disclosure Patch

    CISA has added a Microsoft Windows information‑disclosure vulnerability tracked as CVE‑2026‑20805 to its Known Exploited Vulnerabilities (KEV) Catalog, citing evidence of active exploitation and triggering urgent remediation expectations under Binding Operational Directive (BOD) 22‑01 for...